2026 Best Software Awards are here!See the list

Compare Microsoft Defender for Cloud and Wiz

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Star Rating
(303)4.4 out of 5
Market Segments
Mid-Market (38.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial
Learn more about Microsoft Defender for Cloud
Wiz
Wiz
Star Rating
(757)4.7 out of 5
Market Segments
Enterprise (54.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Wiz
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Wiz excels in providing exceptional visibility across cloud environments, making it easier for users to identify misconfigurations and vulnerabilities in real time. This is highlighted by its agentless architecture, which allows for quick deployment without the need for extensive setup, a feature that many users appreciate.
  • Users say that Microsoft Defender for Cloud offers a user-friendly experience, particularly with its centralized dashboard that presents findings and recommendations clearly. Reviewers have noted that this feature streamlines their workflow and makes it easy to assign remediation tasks to team members.
  • According to verified reviews, Wiz has a significant edge in overall user satisfaction, reflected in its higher G2 Score. Users appreciate its ability to turn complex data into actionable insights, which enhances their security posture and compliance management.
  • Reviewers mention that while Microsoft Defender for Cloud is easy to use, it sometimes struggles with specific workflow needs, particularly in the Cloud Security Posture Management area. Users have pointed out challenges in configuration that can hinder their overall experience.
  • G2 reviewers highlight that Wiz's comprehensive vulnerability management and ITSM tool integration are standout features, allowing for in-depth cloud asset configuration visibility. This capability is particularly beneficial for enterprises looking to maintain robust security across their cloud environments.
  • Users report that Microsoft Defender for Cloud provides valuable real-time notifications for potential threats, which gives them peace of mind regarding security issues. However, some users feel that its performance in the Cloud-Native Application Protection Platform category could be improved compared to Wiz's offerings.
Pricing
Entry-Level Pricing
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Free Trial
Learn more about Microsoft Defender for Cloud
Wiz
No pricing available
Free Trial
Microsoft Defender for Cloud
No trial information available
Wiz
Free Trial is available
Ratings
Meets Requirements
8.8
229
9.1
626
Ease of Use
8.7
230
8.7
629
Ease of Setup
8.6
134
9.1
489
Ease of Admin
8.8
119
9.0
476
Quality of Support
8.6
223
9.2
597
Has the product been a good partner in doing business?
8.5
116
9.4
465
Product Direction (% positive)
9.6
218
9.8
584
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.7
55
8.8
125
Management
9.1
45
8.7
118
8.4
45
8.4
105
8.7
44
9.3
118
Operations
8.9
44
8.9
106
8.7
44
8.6
109
8.4
45
9.0
110
Security Controls
8.6
45
8.5
75
8.6
44
Feature Not Available
8.9
44
9.1
105
8.6
44
Feature Not Available
9.1
25
8.4
207
Administration
9.3
22
9.0
193
9.0
21
8.2
183
9.1
22
9.1
196
9.1
22
8.9
190
Monitoring
9.0
20
8.4
169
9.0
20
7.9
162
9.5
20
8.6
180
Protection
8.9
19
8.5
174
8.9
21
8.0
169
9.2
22
Feature Not Available
9.5
21
7.7
163
8.6
111
8.6
291
Security
8.8
97
9.0
275
8.6
97
8.3
224
8.6
95
Feature Not Available
8.5
95
8.9
250
Compliance
8.6
97
8.7
244
8.5
93
8.4
231
8.8
94
8.3
230
Administration
8.7
92
8.5
259
8.7
94
8.6
233
8.6
93
8.3
248
Not enough data
8.3
295
Performance
Not enough data
8.4
279
Not enough data
8.8
274
Not enough data
7.4
274
Not enough data
9.0
279
Network
Not enough data
8.6
258
Not enough data
8.5
254
Not enough data
8.8
274
Application
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - Vulnerability Scanner
Not enough data
7.4
29
Not enough data
7.4
29
Software Composition AnalysisHide 6 FeaturesShow 6 Features
9.7
14
9.1
66
Functionality - Software Composition Analysis
9.4
12
8.8
54
9.9
12
9.3
59
9.7
12
9.2
56
Effectiveness - Software Composition Analysis
9.6
12
8.7
59
10.0
12
9.2
58
9.6
12
9.2
60
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.3
64
8.2
246
Activity Monitoring
8.5
63
Feature Not Available
8.4
62
Feature Not Available
8.4
63
7.5
183
8.6
61
8.0
196
Security
8.5
62
8.6
204
7.9
60
8.9
214
8.4
62
8.4
220
Administration
8.4
60
8.4
201
8.1
61
8.7
211
8.1
60
9.1
211
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
7.5
20
Not enough data
7.5
20
Not enough data
7.5
19
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
8.9
32
Detection & Response
Not enough data
9.1
27
Not enough data
9.2
26
Not enough data
9.6
26
Not enough data
8.4
27
Management
Not enough data
8.6
26
Not enough data
8.9
25
Not enough data
9.2
22
Analytics
Not enough data
8.8
27
Not enough data
8.2
26
Not enough data
8.8
27
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
8.9
19
Not enough data
Documentation
9.2
16
Not enough data
8.6
16
Not enough data
9.2
15
Not enough data
Security
8.3
15
Not enough data
9.0
17
Not enough data
9.3
15
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.6
73
8.8
314
Configuration
8.4
62
Feature Not Available
8.7
63
8.9
278
8.6
59
8.4
251
8.6
60
8.1
248
8.4
65
8.5
264
Visibility
8.4
63
9.3
282
8.8
59
9.2
285
Vulnerability Management
8.6
62
8.4
266
8.9
61
9.2
293
8.6
62
8.9
274
8.6
62
9.1
289
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.6
220
Asset Management
Not enough data
9.3
192
Not enough data
8.0
166
Not enough data
7.6
163
Monitoring
Not enough data
8.6
176
Not enough data
9.0
189
Not enough data
8.8
178
Not enough data
9.0
187
Risk Management
Not enough data
9.2
207
Not enough data
8.6
195
Not enough data
8.7
192
Not enough data
8.5
196
Generative AI
Not enough data
8.0
101
8.2
9
8.6
135
Alerts management
8.1
8
8.8
109
8.3
8
8.5
110
7.7
8
9.0
119
Monitoring
8.1
8
8.4
104
8.1
8
8.5
115
7.7
8
8.4
101
8.3
8
7.8
104
Automation
8.3
8
8.2
109
8.3
8
8.6
112
Analysis
8.6
7
8.7
126
8.7
9
8.5
123
8.8
8
9.3
126
8.1
8
8.5
114
Issue Resolution
7.4
9
8.6
117
8.3
8
8.9
122
8.3
8
9.0
114
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
8.2
50
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.1
44
Not enough data
8.7
45
Not enough data
8.5
45
Not enough data
6.8
43
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.4
46
Not enough data
7.2
45
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.0
49
Not enough data
8.9
49
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
9.0
23
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.5
19
Not enough data
9.2
19
Not enough data
8.9
19
Not enough data
9.5
21
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
8.9
19
Not enough data
9.1
20
Not enough data
9.0
18
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.4
20
Not enough data
9.5
20
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
7.9
18
Not enough data
8.1
17
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
7.6
14
Generative AI - Exposure Management Platforms
Not enough data
6.2
14
Not enough data
5.9
13
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.3
13
Monitoring and Integration - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.5
13
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
8.5
12
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
8.5
8
Not enough data
8.3
8
Not enough data
8.1
7
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
8.7
9
Not enough data
8.8
7
Not enough data
8.6
7
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
8.5
10
Not enough data
8.3
8
Not enough data
8.5
8
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
7.2
12
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
6.7
11
Not enough data
7.0
11
Not enough data
7.0
11
Services - Cloud Detection and Response (CDR)
Not enough data
8.2
12
Reviews
Reviewers' Company Size
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Small-Business(50 or fewer emp.)
25.9%
Mid-Market(51-1000 emp.)
38.0%
Enterprise(> 1000 emp.)
36.1%
Wiz
Wiz
Small-Business(50 or fewer emp.)
6.4%
Mid-Market(51-1000 emp.)
39.3%
Enterprise(> 1000 emp.)
54.3%
Reviewers' Industry
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Information Technology and Services
22.6%
Computer Software
12.0%
Computer & Network Security
10.9%
Education Management
6.9%
Oil & Energy
3.6%
Other
43.8%
Wiz
Wiz
Financial Services
18.4%
Information Technology and Services
12.1%
Computer Software
11.4%
Computer & Network Security
4.0%
Hospital & Health Care
3.9%
Other
50.2%
Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud Alternatives
Orca Security
Orca Security
Add Orca Security
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Sysdig Secure
Sysdig Secure
Add Sysdig Secure
Wiz
Wiz Alternatives
Orca Security
Orca Security
Add Orca Security
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Sysdig Secure
Sysdig Secure
Add Sysdig Secure
Discussions
Microsoft Defender for Cloud
Microsoft Defender for Cloud Discussions
What are the three security services provided by Windows Azure?
2 Comments
KS
It provides azure firewall, Microsoft sentinel, prevents DDOS Attack, defender for cloud Read more
What is Azure security management?
1 Comment
Salamat S.
SS
Defender Read more
Is Azure security Center a SIEM?
1 Comment
Ayush M.
AM
Azure Security Center (ASC) is a cloud-native security management platform that provides unified security management and threat protection across hybrid...Read more
Wiz
Wiz Discussions
Monty the Mongoose crying
Wiz has no discussions with answers